Sciweavers

376 search results - page 65 / 76
» A Controlled Language for the Specification of Contracts
Sort
View
POPL
2008
ACM
16 years 2 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
107
Voted
POPL
2010
ACM
15 years 11 months ago
Monads in Action
In functional programming, monadic characterizations of computational effects are normally understood denotationally: they describe how an effectful program can be systematically ...
Andrzej Filinski
133
Voted
AAAI
2004
15 years 3 months ago
SCoT: A Spoken Conversational Tutor
We describe SCoT, a Spoken Conversational Tutor, which has been implemented in order to investigate the advantages of natural language in tutoring, especially spoken language. SCo...
Karl Schultz, Brady Clark, Heather Pon-Barry, Eliz...
POPL
2003
ACM
16 years 2 months ago
New results on the computability and complexity of points - to analysis
Given a program and two variables p and q, the goal of points-to analysis is to check if p can point to q in some execution of the program. This well-studied problem plays a cruci...
Venkatesan T. Chakaravarthy
144
Voted
KBSE
2005
IEEE
15 years 7 months ago
Clearwater: extensible, flexible, modular code generation
Distributed applications typically interact with a number of heterogeneous and autonomous components that evolve independently. Methodical development of such applications can ben...
Galen S. Swint, Calton Pu, Gueyoung Jung, Wenchang...